O LEVEL- IT TOOLS & BUSINESS SYSTEM
TRICKS TO CRACK FIRST PAPER:
M1-R4: IT TOOLS & BUSINESS SYSTEMS
SOME IMPORTANT TOPICS WHICH FREQUENTLY ASKED EVERY YEAR:--
Difference
between follwings---
SPAM , VIRUS , MALWARE, INTERPRETER,
COMPILER , IMPACT ,NON IMPACT PRINTER , RAM , ROM ,DDL , DML ,SYSTEM SOFWARE ,
APPLICATION SOFTWARE , PRIMARY KEY , FOREIGN KEY ,MICR , OCR , MULTROCESSING ,
MULTIPROGRAMMING , CACHE AND REGISTER MEMORY TEMPLATE AND WIZARD----
SPAM
Also known as
unsolicited bulk e-mail messages or any email messages irrespective of content
that is unwanted or unrequested by the recipient. Spam messages are mostly commercial
advertising, although chain letters, political mailings and other forms of
non-commercial mailings are often included under the same categorization. A
large portion of spam has also been found to be comprised of ads for products
of dubious quality and services of questionable legality.
There are two types
of spam: intentional and unintentional.
Intentional spam comes from spammers
who are soliciting products or attempting to commit fraud.
Unintentional spam originates from
computers that are infected with a virus or worm that activates e-mail
distribution processes in the background. The virus or worm attempts to send
bulk messages from the infected computer without the awareness of the computer
owner.
VIRUS
|
MALWARE
|
|
Definition
|
A virus is a program code that attaches itself to a
program or file and infects other computers through that file.
|
Malware is short for malicious software.
These are programs used to disrupt
computer operations,
gather sensitive
data
or gain access to private systems.
|
Controlled remotely
|
No
|
Depends on the type of Malware.
|
Types
|
Resident viruses and non-resident viruses.
|
Computer viruses, Ransomware, Worms,
Trojan horses, Rootkits, Keyloggers,
Dialers, Spyware, Adware, Malicious
BHOs, Rogue
security software
|
Process of infection
|
Attaches itself to an executable file, folder or program.
|
Can spread automatically or requires
user intervention, depending on the
type of malware.
|
Process of spreading
|
Viruses rely on transfer of files or other programs in
order to spread to other systems.
|
Spread using executable software of
through transference of files and folders.
|
Infecting files
|
Yes, it modifies, alters or deletes certain files.
|
Can modify, alter or delete data. Can
collect information
and pass on other
locations.
|
Speed of spreading
|
Slower compared to worms.
|
Speed depends on the type of malware.
Viruses are slow in
spreading,
while worms are
fast.
|
Type
|
Malware
|
Malware
|
Replication
|
Yes
|
Yes
|
Protection
|
Antivirus software
|
Antimalware software
|
Removal
|
Antivirus, formatting, system restore.
|
Antimalware, formatting, system restore.
|
Comments
Post a Comment